FMC Features in Version 6.4.x
Feature |
Details |
||
---|---|---|---|
Version 6.4.0.17 Smaller VDB for lower memory devices. |
For VDB 363+, the system now installs a smaller VDB (also called VDB lite) on lower memory devices. This smaller VDB contains the same applications, but fewer detection patterns. Devices using the smaller VDB can miss some application identification versus devices using the full VDB. Minimum threat defense: Any Lower memory devices: ASA 5506-X series, ASA-5508-X, 5512-X, 5515-X, 5516-X, 5525-X, 5545-X Version restrictions: The ability to install a smaller VDB depends on the version of the FMC, not managed devices. If you upgrade the FMC from a supported version to an unsupported version, you cannot install VDB 363+ if your deployment includes even one lower memory device. For a list of affected releases, see CSCwd88641. |
||
Version 6.4.0.10 Upgrades postpone scheduled tasks. |
Upgrade impact. Upgrades now postpone scheduled tasks. Any task scheduled to begin during the upgrade will begin five minutes after the post-upgrade reboot.
Note that this feature is supported for Firepower appliances running Version 6.4.0.10 or any later patch. It is not supported for upgrades to Version 6.4.0.10, or upgrades that skip Version 6.4.0.10. This feature is temporarily deprecated in Versions 6.5.0–6.6.1, but returns in Version 6.6.3. |
||
Version 6.4.0.9 Default HTTPS server certificates. |
Upgrade impact. Upgrading an FMC or 7000/8000 series device from Version 6.4.0–6.4.0.8 to any later Version 6.4.0.x patch (or an FMC to Version 6.6.0+) renews the default HTTPS server certificate, which expires 800 days from the date of the upgrade. All future renewals have an 800 day lifespan. Your old certificate was set to expire depending on when it was generated, as follows:
Note that in Version 6.5.0–6.5.0.4, the lifespan-on-renew returns to 3 years, but this is again updated to 800 days with Version 6.5.0.5 and 6.6.0. |
||
Version 6.4.0.4 New syslog fields. |
These new syslog fields collectively identify a unique connection event:
These fields also appear in syslogs for intrusion, file, and malware events, allowing connection events to be associated with those events. |
||
Version 6.4.0.2 Detection of rule conflicts in FTD NAT policies. |
Upgrade impact. After you upgrade to Version 6.4.0.2 or later patch, you can no longer create FTD NAT policies with conflicting rules (often referred to as duplicate or overlapping rules). This fixes an issue where conflicting NAT rules were applied out-of-order. If you currently have conflicting NAT rules, you will be able to deploy post-upgrade. However, your NAT rules will continue to be applied out-of-order. Therefore, we recommend that after the upgrade, you inspect your FTD NAT policies by editing (no changes are needed) then attempting to resave. If you have rule conflicts, the system will prevent you from saving. Correct the issues, save, and then deploy. |
||
Version 6.4.0.2 ISE Connection Status Monitor health module. |
A new health module, the ISE Connection Status Monitor, monitors the status of the server connections between the Cisco Identity Services Engine (ISE) and the FMC. |
Feature |
Details |
||
---|---|---|---|
Platform |
|||
FMC 1600, 2600, and 4600. |
We introduced the FMC models FMC 1600, 2600, and 4600. |
||
FMCv for Azure. |
We introduced FMCv for Microsoft Azure. |
||
FTD on the Firepower 1010, 1120, and 1140. |
We introduced the Firepower 1010, 1120, and 1140. |
||
FTD on the Firepower 4115, 4125, and 4145. |
We introduced the Firepower 4115, 4125, and 4145. |
||
Firepower 9300 SM-40, SM-48, and SM-56 support. |
We introduced three new security modules: SM-40, SM-48, and SM-56. With FXOS 2.6.1, you can mix different types of security modules in the same chassis. |
||
ASA and FTD on the same Firepower 9300. |
With FXOS 2.6.1, you can now deploy ASA and FTD logical devices on the same Firepower 9300. |
||
Firepower Threat Defense: Device Management |
|||
FTDv for VMware defaults to vmxnet3 interfaces. |
FTDv for VMware now defaults to vmxnet3 interfaces when you create a virtual device. Previously, the default was e1000. The vmxnet3 device drivers and network processing are integrated with the ESXi hypervisor, so they use fewer resources and offer better network performance.
Supported platforms: FTDv for VMware |
||
Firepower Threat Defense: Routing |
|||
Rotating (keychain) authentication for OSPFv2 routing. |
You can now use rotating (keychain) authentication when configuring OSPFv2 routing. New/modified pages:
Supported platforms: FTD |
||
Firepower Threat Defense: Encryption and VPN |
|||
RA VPN: Secondary authentication. |
Secondary authentication, also called double authentication, adds an additional layer of security to RA VPN connections by using two different authentication servers. With secondary authentication enabled, AnyConnect VPN users must provide two sets of credentials to log in to the VPN gateway. RA VPN supports secondary authentication for the AAA Only and Client Certificate and AAA authentication methods. New/modified pages: > add/edit configuration > Connection Profile > AAA area Supported platforms: FTD |
||
Site-to-site VPN: Dynamic IP addresses for extranet endpoints. |
You can now configure site to site VPNs to use a dynamic IP address for extranet endpoints. In hub-and-spoke deployments, you can use a hub as an extranet endpoint. New/modified pages: > add/edit FTD VPN topology > Endpoints tab > add endpoint > IP Address option Supported platforms: FTD |
||
Site-to-site VPN: Dynamic crypto maps for point-to-point topologies. |
You can now use dynamic crypto maps in point-to-point as well as in hub-and-spoke VPN topologies. Dynamic crypto maps are still not supported for full mesh topologies. You specify the crypto map type when you configure a topology. Make sure you also specify a dynamic IP address for one of the peers in the topology. New/modified pages: > add/edit FTD VPN topology > IPsec tab > Crypto Map Type option Supported platforms: FTD |
||
TLS crypto acceleration. |
Upgrade impact. SSL hardware acceleration has been renamed TLS crypto acceleration. Depending on the device, TLS crypto acceleration might be performed in software or in hardware. The Version 6.4.0 upgrade process automatically enables acceleration on all eligible devices, even if you previously disabled the feature manually. In most cases you cannot configure this feature; it is automatically enabled and you cannot disable it. However, if you are using the multi-instance capability of the Firepower 4100/9300 chassis, you can enable TLS crypto acceleration for one container instance per module/security engine. Acceleration is disabled for other container instances, but enabled for native instances. New FXOS CLI commands for the Firepower 4100/9300 chassis:
New FTD CLI commands:
Removed FTD CLI commands:
Supported platforms: Firepower 2100 series, Firepower 4100/9300 |
||
Event Logging and Analysis |
|||
Improvements to syslog messages for file and malware events. |
Fully qualified file and malware event data can now be sent from managed devices via syslog. New/modified pages: > add/edit policy > Logging tab > File and Malware Settings area Supported platforms: Any |
||
Search intrusion events by CVE ID. |
You can now search for intrusion events generated as a result of a particular CVE exploit. New/modified pages: Supported platforms: FMC |
||
IntrusionPolicy field is now included in syslog. |
Intrusion event syslog messages now specify the intrusion policy that triggered the event. Supported platforms: Any |
||
Cisco SecureX integration. |
Cisco SecureX is a cloud offering that helps you rapidly detect, investigate, and respond to threats. This feature lets you analyze incidents using data aggregated from multiple products, including Firepower Threat Defense. Note that the FMC web interface refers to this offering as Cisco Threat Response (CTR). See the Cisco Secure Firewall Threat Defense and SecureX Integration Guide.New/modified pages: Supported platforms: FTD |
||
Splunk integration. |
Splunk users can use a new, separate Splunk app, Cisco Secure Firewall (f.k.a. Firepower) app for Splunk, to analyze events. Available functionality is affected by your Firepower version. See Cisco Secure Firewall App for Splunk User Guide. Supported platforms: FMC |
||
Cisco Security Analytics and Logging (SaaS) integration. |
You can send Firepower events to the Stealthwatch Cloud for storage, and optionally make your Firepower event data available for security analytics using Stealthwatch Cloud. Using Cisco Security Analytics and Logging (SaaS), also known as SAL (SaaS), your Firepower devices send events as syslog messages to a Security Events Connector (SEC) installed on a virtual machine on your network, and this SEC forwards the events to the Stealthwatch cloud for storage. You view and work with your events using the web-based Cisco Defense Orchestrator (CDO) portal. Depending on the license you purchase, you can also use the Stealthwatch portal to access that product's analytics features. Supported platforms: FTD with FMC |
||
Administration and Troubleshooting |
|||
New licensing capabilities for ISA 3000. |
For ASA FirePOWER and FTD deployments, the ISA 3000 now supports URL Filtering and Malware licenses and their associated features. For FTD only, the ISA 3000 also now supports Specific License Reservation for approved customers. Supported platforms: ISA 3000 |
||
Scheduled remote backups of managed devices. |
You can now use the FMC to schedule remote backups of certain managed devices. Previously, only Firepower 7000/8000 series devices supported scheduled backups, and you had to use the device's local GUI. New/modified pages: > add/edit task > choose Job Type: Backup > choose a Backup Type Supported platforms: FTD physical platforms, FTDv for VMware, Firepower 7000/8000 series Exceptions: No support for FTD clustered devices or container instances |
||
Ability to disable Duplicate Address Detection (DAD) on management interfaces. |
When you enable IPv6, you can disable DAD. You might want to disable DAD because using DAD opens up the possibility of denial of service attacks. If you disable this setting, you need check manually that this interface is not using an already-assigned address. New/modified pages: > edit interface > IPv6 DAD check box areaSupported platforms: FMC, Firepower 7000/8000 series |
||
Ability to disable ICMPv6 Echo Reply and Destination Unreachable messages on management interfaces. |
When you enable IPv6, you can now disable ICMPv6 Echo Reply and Destination Unreachable messages. You might want to disable these packets to guard against potential denial of service attacks. Disabling Echo Reply packets means you cannot use IPv6 ping to the device management interfaces for testing purposes. New/modified pages: New/modified commands:
Supported platforms: FMC (web interface only), managed devices (CLI only) |
||
Support for the Service-Type attribute for FTD users defined on the RADIUS server. |
For RADIUS authentication of FTD CLI users, you used to have to predefine the usernames in the RADIUS external authentication object and manually make sure that the list matched usernames defined on the RADIUS server. You can now define CLI users on the RADIUS server using the Service-Type attribute and also define both Basic and Config user roles. To use this method, be sure to leave the shell access filter blank in the external authentication object. New/modified pages: > add/edit external authentication object > Shell Access Filter tabSupported platforms: FTD |
||
View object use. |
The object manager now allows you to see the policies, settings, and other objects where a network, port, VLAN, or URL object is used. New/modified pages: Objects > Object Management > choose object type > Find Usage (binoculars) icon Supported platforms: FMC |
||
Hit counts for access control and prefilter rules. |
You can now access hit counts for access control and prefilter rules on your FTD devices. New/modified pages:
New commands:
Modified commands: show failover Supported platforms: FTD |
||
URL Filtering health monitor improvements. |
You can now configure time thresholds for URL Filtering Monitor alerts. New/modified pages: > add/edit policy > URL Filtering Monitor Supported platforms: Any |
||
Connection-based troubleshooting. |
Connection-based troubleshooting or debugging provides uniform debugging across modules to collect appropriate logs for a specific connection. It also supports level-based debugging up to 7 levels and enables uniform log collection mechanism for lina and Snort logs. New/modified commands:
Supported platforms: FTD |
||
New Cisco Success Network monitoring capabilities |
Added the following Cisco Success Network monitoring capabilities:
Supported platforms: FMC |
||
Security and Hardening |
|||
Signed SRU, VDB, and GeoDB updates. |
So Firepower can verify that you are using the correct update files, Version 6.4.0+ uses signed updates for intrusion rules (SRU), the vulnerability database (VDB), and the geolocation database (GeoDB). Earlier versions continue to use unsigned updates. Unless you manually download updates from Cosco—for example, in an air-gapped deployment—you should not notice any difference in functionality. If, however, you do manually download and install SRU, VDB, and GeoDB updates, make sure you download the correct package for your current version. Signed update files for Version 6.4.0+ begin with 'Cisco' instead of 'Sourcefire,' and terminate in .sh.REL.tar instead of .sh:
Update files for Version 5.x through 6.3 still use the old naming scheme:
We will provide both signed and unsigned updates until the end-of-support for versions that require unsigned updates. Do not untar signed (.tar) packages.
Supported platforms: Any |
||
SNMPv3 users can authenticate using a SHA-256 authorization algorithm. |
SNMPv3 users can now authenticate using a SHA-256 algorithm. New/modified screen: Devices > Platform Settings > SNMP > Users > Auth Algorithm Type Supported platforms: Firepower Threat Defense |
||
2048-bit certificate keys now required (security enhancement). |
Upgrade impact. When making secure connections to external data sources, such as AMP for Endpoints or Cisco Threat Intelligence Detector (TID), the FMC now requires that the server certificate be generated with keys that are at least 2048 bits long. Certificates previously generated with 1024-bit keys will no longer work. Note that this security enhancement was introduced in Version 6.3.0.3. If you are upgrading from Version 6.1.0 through 6.3.0.2, you may be affected. If you cannot connect, regenerate the server certificate on your data source. If necessary, reconfigure the FMC connection to the data source. Supported platforms: FMC |
||
Usability and Performance |
|||
Snort restart improvements. |
Before Version 6.4.0, during Snort restarts, the system dropped encrypted connections that matched a 'Do not decrypt' SSL rule or default policy action. Now, routed/transparent traffic passes without inspection instead of dropping, as long as you did not disable large flow offload or Snort preserve-connection. Supported platforms: Firepower 4100/9300 |
||
Performance improvement for selected IPS traffic. |
Upgrade impact. Egress optimization is a performance feature targeted for selected IPS traffic. It is enabled by default on all FTD platforms, and the Version 6.4.0 upgrade process enables egress optimization on eligible devices. New/modified commands:
For more information, see the Cisco Secure Firewall Threat Defense Command Reference. To troubleshoot issues with egress optimization, contact Cisco TAC.
Supported platforms: FTD |
||
Faster SNMP event logging. |
Performance improvements when sending intrusion and connection events to an external SNMP trap server. Supported platforms: Any |
||
Faster deploy. |
Improvements to appliance communications and deploy framework. Supported platforms: FTD |
||
Faster upgrade. |
Improvements to the event database. Supported platforms: Any |
||
Firepower Management Center REST API |
|||
New REST API capabilities. |
Added REST API objects to support Version 6.4.0 features:
Supported platforms: FMC |
||
API Explorer based on OAS. |
Version 6.4.0 uses a new API Explorer, based on the OpenAPI Specification (OAS). As part of the OAS, you now use CodeGen to generate sample code. You can still access the legacy API Explorer if you prefer. Supported platforms: FMC |
||
Deprecated Features |
|||
Deprecated: SSL hardware acceleration FTD CLI commands. |
As part of the TLS crypto acceleration feature, we removed the following FTD CLI commands:
|
||
Deprecated: Geolocation details. |
In May 2022 we split the GeoDB into two packages: a country code package that maps IP addresses to countries/continents, and an IP package that contains additional contextual data associated with routable IP addresses. The contextual data in the IP package can include additional location details, as well as connection information such as ISP, connection type, proxy type, domain name, and so on. The new country code package has the same file name as the old all-in-one package: Cisco_GEODB_Update-date-build. This allows deployments running Version 7.1 and earlier to continue to obtain GeoDB updates. If you manually download GeoDB updates—for example, in an air-gapped deployment—make sure you get the country code package and not the IP package.
|